1. Kocher P, Jaffe J, Jun B. Differential power analysis. Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, Aug 15-19, 1999, Santa Barbara, CA, USA. Berlin, Germany: Springer, 1999: 398-412
2. Brier E, Clavier C, Oliver F. Correlation power analysis with a leakage model. Workshop on Cryptographic Hardware and Embedded Systems (CHES2004), Aug 16-19, 2004, Cambridge, MA, USA. 2004: 16-29
3. Messerges T, Dabbish E, Sloan R. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computer, 2002, 51(5): 541-552
4. Standaert F, Ors S, Quisquater J, et al. Power analysis attacks against FPGA implementations of the DES. Workshop on Cryptographic Hardware and Embedded Systems (CHES2004), Aug 16-19, 2004, Cambridge, MA, USA. 2004: 30-44
5. Ors S, Gurkaynak F, Oswald E, et al. Power analysis attack on an ASIC AES implementation. Proceeding of International Conference on Information Technology (ITCC 2004), Apr 5-7, 2004, Las Vegas, NV, USA. 2004: 546-552
6. Federal Information Processing Standards Publication 197. Announcing the Advanced Encryption Standard (AES), November, 2001
7. Koeune F, Standaert F X. A tutorial on physical security and side-channel attacks. Proceedings of 5th International School on Foundations of Security Analysis and Design (LNCS 3655), Sep 19-24, 2005, Bertinoro, Italy. 2005: 78-108
8. Pramstaller N, Mangard S, Dominikus S, et al. Efficient AES implementations on ASICs and FPGAs. 4 th International Conference of AES2004 (LNCS 3373), May 10-12, 2004. Bonn, Germany, 2004: 98-112
9. Rabaey J M, Chandrakasan A, Nikolic B. Digital integrated circuits, a design perspective. Second Edition. Upper Saddle River, NJ, USA: Prentice-Hall, 2003 |